GLSA 200506-17: SpamAssassin 3, Vipul's Razor: Denial of Service vulnerability

Severity:normal
Title:SpamAssassin 3, Vipul's Razor: Denial of Service vulnerability
Date:06/21/2005
Bugs: #94722, #95492, #96776
ID:200506-17

Synopsis

SpamAssassin and Vipul's Razor are vulnerable to a Denial of Service attack when handling certain malformed messages.

Background

SpamAssassin is an extensible email filter which is used to identify junk email. Vipul's Razor is a client for a distributed, collaborative spam detection and filtering network.

Affected packages

Package Vulnerable Unaffected Architecture(s)
mail-filter/spamassassin < 3.0.4 >= 3.0.4 All supported architectures
mail-filter/razor < 2.74 >= 2.74 All supported architectures

Description

SpamAssassin and Vipul's Razor contain a Denial of Service vulnerability when handling special misformatted long message headers.

Impact

By sending a specially crafted message an attacker could cause a Denial of Service attack against the SpamAssassin/Vipul's Razor server.

Workaround

There is no known workaround at this time.

Resolution

All SpamAssassin users should upgrade to the latest version:

    # emerge --sync
    # emerge --ask --oneshot --verbose ">=mail-filter/spamassassin-3.0.4"

All Vipul's Razor users should upgrade to the latest version:

# emerge --sync # emerge --ask --oneshot --verbose ">=mail-filter/razor-2.74"

References

Availability

This GLSA and any updates to it are available for viewing at the Gentoo Security Website: http://security.gentoo.org/glsa/glsa-200506-17.xml

Concerns?

Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.

License

Copyright 2010 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.

Thank you!